Sciweavers

3556 search results - page 563 / 712
» Can machine learning be secure
Sort
View
AIED
2009
Springer
14 years 5 months ago
Discovering Tutorial Dialogue Strategies with Hidden Markov Models
Identifying effective tutorial strategies is a key problem for tutorial dialogue systems research. Ongoing work in human-human tutorial dialogue continues to reveal the complex phe...
Kristy Elizabeth Boyer, Eunyoung Ha, Michael D. Wa...
ICRA
2008
IEEE
121views Robotics» more  ICRA 2008»
14 years 5 months ago
Trajectory inverse kinematics by conditional density modes
Abstract— We present a machine learning approach for trajectory inverse kinematics: given a trajectory in workspace, to find a feasible trajectory in angle space. The method lea...
Chao Qin, Miguel Á. Carreira-Perpiñ&...
KBSE
2007
IEEE
14 years 5 months ago
The business case for automated software engineering
Adoption of advanced automated SE (ASE) tools would be favored if a business case could be made that these tools are more valuable than alternate methods. In theory, software pred...
Tim Menzies, Oussama El-Rawas, Jairus Hihn, Martin...
MIDDLEWARE
2007
Springer
14 years 4 months ago
A node discovery service for partially mobile sensor networks
Wireless Sensor Networks (WSNs) are challenging types of networks where resources can be scarce. In particular, battery is often a very limited resource and the radio interface is...
Vladimir Dyo, Cecilia Mascolo
IUI
2006
ACM
14 years 4 months ago
Fewer clicks and less frustration: reducing the cost of reaching the right folder
Helping computer users rapidly locate files in their folder hierarchies has become an important research topic in today’s intelligent user interface design. This paper reports o...
Xinlong Bao, Jonathan L. Herlocker, Thomas G. Diet...